Sciweavers

2652 search results - page 248 / 531
» Privacy-preserving linear programming
Sort
View
129
Voted
PODC
2003
ACM
15 years 9 months ago
A lattice-theoretic characterization of safety and liveness
The distinction between safety and liveness properties is due to Lamport who gave the following informal characterization. Safety properties assert that nothing bad ever happens w...
Panagiotis Manolios, Richard J. Trefler
166
Voted
RTSS
2002
IEEE
15 years 8 months ago
Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements
In addition to real-time requirements, the program code size is a critical design factor for real-time embedded systems. To take advantage of the code size vs. execution time trad...
Insik Shin, Insup Lee, Sang Lyul Min
138
Voted
FPGA
1999
ACM
142views FPGA» more  FPGA 1999»
15 years 8 months ago
Multi-Terminal Net Routing for Partial Crossbar-Based Multi-FPGA Systems
Multi-FPGA systems are used as custom computing machines to solve compute intensive problems and also in the verification and prototyping of large circuits. In this paper, we addr...
Abdel Ejnioui, N. Ranganathan
101
Voted
ICRA
1993
IEEE
118views Robotics» more  ICRA 1993»
15 years 7 months ago
Mechanical Computation for Passive Force Control
Force control implemented by a passive mechanical device (perhaps a wrist) has inherent advantages over active implementations. A passive mechanical device can regain some of the ...
Ambarish Goswami, Michael A. Peshkin
140
Voted
ICFEM
2007
Springer
15 years 7 months ago
Automating Refinement Checking in Probabilistic System Design
Abstract. Refinement plays a crucial role in "top-down" styles of verification, such as the refinement calculus, but for probabilistic systems proof of refinement is a pa...
Carlos Gonzalia, Annabelle McIver